Académique Documents
Professionnel Documents
Culture Documents
5, October 2017
ABSTRACT
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a
dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes
deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location.
The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and
one or more sink nodes that provide an interface to the outside world. The proposed architecture is a
generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a
flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are
partitioned into clusters where data can be gathered from the environment and synthesized under local
control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged
deployment areas or environments containing buildings by training the network of nodes arbitrarily
dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols,
respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are
used to minimize the power expended in collecting and routing data to the sink node, thus increasing the
lifetime of the network.
KEYWORDS
Wireless Sensor Network, Self-organization, Training protocol, Energy-efficient Routing Protocol.
1. INTRODUCTION
A wireless sensor network (WSN) is a distributed system comprising a number of tiny wireless
sensing devices that integrate signal processing and wireless communications capabilities ([1],
[2]). Each sensor is powered by a non-rechargeable and non-replaceable battery and has low
memory, computation, and transmission range capacities ([1]). Each sensor is able to harvest a set
of data in a certain environment, and transmit it in a multi-hop manner to a base station (BS)
where it is utilized. WSNs have a significant impact on various fields including military,
scientific, industrial, and healthcare. Further, the ubiquity of WSNs has resulted in them
pervading society and redefining the way in which we live and work ([3], [4], [5], [6], [7], [8],
[2]).
DOI: 10.5121/ijwmn.2017.9507 67
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
The fundamental goal of a sensor network is to produce, over an extended period of time,
globally meaningful information from raw local data obtained by individual sensor nodes.
Importantly, this goal must be achieved while prolonging as much as possible the useful lifetime
of the network and ensuring that it remains highly available and continues to provide accurate
information in the face of security attacks and hardware failure. The sheer number of sensor
nodes in a sensor network and the unique characteristics of their operating environment
(anonymity of individual sensors, limited power budget, and a possibly hostile environment) pose
several challenges for the designers of protocols. In fact, the limited power budget at the
individual sensor node level mandates the design of ultra-lightweight data gathering, fusion, and
communication protocols. An important guideline in this direction is to perform as much local
data processing at the sensor level as possible, avoiding the transmission of raw data through the
sensor network. Recent advances in hardware technology have resulted in the biggest challenge
of the sensor network community being the development of ultra-lightweight communication
protocols for activities such as training, self-organization, network maintenance, security, data
collection and fusion, and routing ([4], [9], [10]).
There are several possible models for WSNs. In this work, we consider WSNs in which all the
sensor nodes are fixed, short-ranged, and homogeneous. We assume that the BS and all the sensor
nodes have a local clock that keeps synchronous time, perhaps by interfacing with the BS.
Further, all sensor nodes run the same protocol and can perform computations on the data being
sensed. As is customary, time is assumed to be slotted and all transmissions take place at slotted
boundaries ([11], [12]). This simple model involves using one or more special sink nodes
deployed alongside the sensor nodes. Thus, the raw data collected by individual sensor nodes are
fused in stages and forwarded to the sink nodes, which provide the interface to the outside world.
However, in some applications, it is impossible or impractical to deploy sink nodes within the
sensor network. In such cases, the task of harvesting the information produced by the sensor
network and that of providing an interface to the outside world may be performed by aircraft
and/or helicopters overflying the sensor network, or by laser transmission to a satellite
constellation. In such a network, security is a crucial point that requires serious consideration. In
fact, WSNs have many constraints, including the communication medium, which is wireless:
nowadays it is very easy to read, intercept, and even modify the data transmitted, and to
compromise an entire network. In addition, the sensors application context is another problem, as
they are usually deployed in hostile environments. Thus, there is a need to secure the protocols in
order to guarantee authentication, confidential exchanges ([13], [14]), data integrity, and network
availability. Several security protocols have been proposed in the literature. They include TinySec
([15]) which ensure the authentication of the packets sent from a BS to all nodes (broadcast or
multicast). Ultimately, a good security system should be able to prevent external attacks (coming
from an attacker outside the network) as well as internal attacks (from an attacker inside the
network, possibly by compromising a node).
68
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
coordinates and it results a 2D virtual WSN ([18], [19], [20]). Howard et al., ([20]) propose an
incremental algorithm for self-deployment of in 2D. However there are few papers on the design
of 3D WSN. A virtual 3D network architecture for Underwater Sensor Networks (UWSNs) is
introduced by Tamoghna et al., ([21]). The main goal of the so called EDETA (Energy-efficient
aDaptive hiErarchical and robusT Architecture) ([22]) which based on two-levels hieratical
architecture, is to optimize the save nodes power. EDETA is more suitable for the
implementation of safety applications such as a wireless fire detection system. Boufares et al.,
([16]) proposed a 3D architecture based on virtual force which is the generalization on the
cellular network in 3D. In the 3D architecture in ([23]) the sensors need to be powerful to carry
out the negotiation tactic that ensure network connectivity, and to manage a density control
strategy that is used to balance the node distribution, hence we are far from the sensors defined as
Micro Electro-Mechanical Systems (MEMS) miniaturized low-power devices that integrate
sensing, special-purpose computing and wireless communications capabilities. Chen and Qian
([24]) derive an algorithm based on ideal fluid dynamics for deploying sensors in 3D. Huang et
al., ([25]) show how the coverage problem can be solved in 3D.
We then show that while training the sensor nodes, the process through which nodes
learn their coordinates can be performed by a secure binary protocol. This protocol only
uses binary comparisons (that are less energy consuming compared to scalar operations)
to perform training. It is then called lightweight protocol.
Next, we propose two energy-efficient routing protocols, respectively for dense WSN and
low-density (or sparse) WSN. The proposed protocols can be used to collect and forward
data from the sensors to the sink node. They use the dynamic coordinate system to
minimize the power expended in collecting and routing data.
The remainder of this paper is organized as follows: Section 2 presents the lightweight training
protocol proposed for virtual clusterisation. Sections 3 and 4 describe the proposed routing
protocols, respectively for dense WSN and low-density WSN, used to send the collected data to
the BS. Section 5 concludes this paper.
69
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
Hereafter we assume a WSN that consists of a sink and a set of sensors randomly deployed in its
3D broadcast range, as illustrated in Figure 1. For simplicity, we assume that the sink node is
centrally placed, although this is not actually necessary. The task of training refers to the
imposing of a coordinate system onto the sensor network in such a manner that each sensor
belongs to exactly one sector.
We assume that the sink node can make l omnidirectional transmissions, m horizontal directional
transmissions, and n vertical directional transmissions. The coordinate system divides the sensor
network area into equiangular wedges (or sections). In turn, these wedges are divided into sectors
by means of concentric spheres or coronas centered at the sink and whose radii are determined to
optimize the transmission efficiency of sensors-to-sink transmission. Sensors in a given sector are
mapped to a cluster; the mapping between clusters and sectors is one-to-one. With reference to
Figure 1, the task of training a sensor network involves establishment of the following:
70
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
2. Horizontal wedges: The deployment area is ruled into m horizontal angular wedges centered
at the sink node;
3. Vertical wedges: The deployment area is ruled into n vertical angular wedges centered at the
sink node.
As illustrated in Figure 1, at the end of the training period, each sensor node has acquired three
coordinates: the identity of the corona in which it lies, and the identity of the horizontal and
vertical wedges to which it belongs. Importantly, the locus of all the sensor nodes that have the
same coordinates determines a cluster.
The main goal of this section is to present, in detail, our proposed lightweight scalable training
protocol for WSNs. The key advantage of this protocol is that each node participating in the
training, incurs an energy cost that is logarithmic in the number of clusters and wedges defined by
the protocol.
After deployment, nodes sleep until they are awakened by their individual timers. Thus, each
node sleeps for a random period of time, wakes up briefly and, if it hears no messages of interest,
selects a random number x and returns to sleep x time units. Clocks are not synchronized but over
any time interval [t, t + t], a percentage directly proportional to t of the nodes are expected to
wake up briefly. During this time interval, the sink continuously repeats a call to training,
specifying the current time and a rendezvous time. Thus, in a probabilistic sense, a certain
percentage of the nodes will be selected for training. The time interval t can be adjusted to control
the percentage of nodes selected. Using the synchronization protocol proposed by Wadaa et al.,
([17]), the selected sensor nodes reset their clocks and set their timer appropriately before
returning to sleep. In fact, it is natural to assume that, just prior to deployment, the sensor nodes
are synchronized. However, because of natural clock drift, resynchronization is necessary. This is
performed with respect to the master clock running at the sink.
2.2.1. THE CORONA TRAINING PROTOCOL
The corona training protocol is similar to that developed by Wadaa et al., ([17]). However, the
corona training protocol operates as follows: formally, consider an l-leaf binary tree T and refer to
Figure 2 (borrowed from [17]). In the figure, the leaves are numbered left to right from one to l.
71
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
The edges of T are labeled by 0s and 1s in such a manner that an edge leading to a left subtree is
labeled 0, and an edge leading to a right subtree is labeled 1.
In this corona training protocol, the preorder and inorder numbers of internal nodes in T
correspond, respectively, to time slots in the training protocol and to the transmission ranges used
by the sink.
2.2.2. THE WEDGES TRAINING PROTOCOL
In the wedges training protocol, the deployment area is divided into m horizontal angular wedges
with angles and n vertical angular wedges with angles . This is shown respectively in Figures
3(a) and 3(b). As in the corona training protocol, sensors must read a string of length(or log2n
bits for vertical angular wedges) they possess. The time is divided in slots, , and
at each slot, the sink node makes a directional horizontal transmission of angle
(respectively, a directional vertical transmission of angle
Figure 3: Horizontal and vertical wedges: (a) Horizontal wedges. (b) Vertical wedges
72
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
The vertical wedges are trained after the horizontal wedges. The wedge training protocol is
virtually similar to the corona training protocol, but the omnidirectional transmissions of the sink
node are replaced by the directional transmissions. The sink node uses the binary tree in Figure 2
to determine the values of the different angles to use in each slot. Figure 4 shows an example of
vertical directional transmissions for n = 8:
We assume that the sensor network is already clustered according to the technique presented in
the previous section. This facilitates structuring of data routing at two levels: within a cluster and
between clusters. To achieve this goal, we introduce two concepts:
Relay cluster: the data collected by sensors in a cluster (i, j, k) can go through many
clusters to reach the sink node. Cluster (i-1, j, k) is designated as a relay cluster of cluster
(i, j, k). It is the first cluster that transits the data collected by the sensors of cluster (i, j,
k);
Cluster-head (or gateway node): This is a unique node in a given cluster that is
responsible for forwarding data to the outside (i.e., to the relay cluster). It is used to
conserve the energy of the sensors in a cluster and prevent unnecessary overloading of
the network.
In our routing protocol, we make the following assumptions:
1. Each node has a unique identifier ID throughout the network;
2. A sensor is able to assess its residual energy (which we denote Er);
3. A message sent by a sensor is received after a finite time (a slot) by all its neighbors;
4. The clustering is set in such a way that all the sensors of a given cluster can directly
communicate between them and with some sensors of their neighboring clusters.
73
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
We consider that all sensors communicate with the same frequency. Thus, there may be many
collisions if communications are not well managed. To avoid collisions between packets
transmitted, several communication channel management protocols exist, for example, frequency
division multiple access (FDMA), time division multiple access (TDMA), and code division
multiple access (CDMA). We chose the carrier sense multiple access/collision avoidance
(CSMA/CA) protocol ([27]) for the reservation of the communication channel. We chose it for
the following reasons:
1. The bandwidth is not subdivided, allowing fast transfer of data;
2. In most WSNs, the amount of data collected is not large, so they are unlikely to be
fragmented; even if that were the case, the fragmentation-reassembly
mechanism of CSMA/CA solves the problem;
3. It enables shared access to the channel, while solving interference problems, and
concurrent access of sensors;
4. Its back-off algorithm gives the same probability to all the sensors to access the channel.
As the sensors have a limited source of energy, we must prevent redundant data releases. Indeed,
it is important to reduce the network traffic to avoid collisions, conserve the energy of the
sensors, and prevent unnecessary overloading of the network. To achieve these objectives, data
collected by sensors must contain a minimum number of messages.
We use cluster-heads to satisfy these conditions. Cluster-heads are the collector nodes in a
cluster; more specifically, they gather data in their cluster before sending them to the relay
cluster. Therefore, the data held by cluster-heads can be compressed or aggregated before
transfers. The data can also be filtered to prevent the transfer of identical messages. Thus,
management of the routing within a cluster increases the energy consumption of the gateway
node compared to the ordinary nodes. Consequently, the role of gateway is given only to nodes
that have sufficient energy.
To start the routing protocol, the sink node repeats a call for routing, specifying the current time
and a rendezvous time. On that date, the sensors must collect data and send them towards the sink
node. Thus, our routing protocol is divided into two steps: (1) election of a cluster-head in each
cluster, and (2) transmission of collected data to the sink node. The second step is itself
subdivided into two phases: routing within a cluster, and routing between clusters.
74
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
1. The Hello message contains two pieces of information, ((i, j, k), (i-1, j, k)): the
coordinates of the current cluster and those of the relay cluster.
2. The Hi message contains two pieces of information, ((i, j, k), (i+1, j, k)): the coordinates
of the relay cluster and those of the current cluster.
3. The Head message contains three pieces of information, (ID, Er, (i, j, k)): identifier of the
current sensor, its residual energy, and the coordinates of its cluster.
The sensors in clusters (1, j, k), do not send any Hello message, instead they respond to Hello
messages sent from clusters (2, j, k) with Hi messages. Subsequently, the sensors with residual
energy greater than the threshold Es, send a Head message in their own cluster. The criteria for
selecting the gateway node are the same here as in clusters (i, j, k), i >1.
To conserve energy and prevent redundant transmission, each sensor reacts only once after the
reception of Hello and Hi messages. This first step of our protocol (distributed cluster-head
election) is performed by each sensor using pseudo-codes 1, 2, 3, 4, and 5 described in Annex 1.
At the end of this step, a cluster-head is elected in each cluster, and the next task (the first phase
of the second step) is to route the data collected towards the sink node through cluster-heads.
3.2. ROUTING WITHIN A CLUSTER
When the sensors in a given cluster wish to send messages to the sink, they send them to the
gateway node (or cluster-head), which will in turn send them to their relay cluster, and so on,
until the sink node is reached. When a sensor receives a message with a destination in its cluster,
it forwards it to the gateway node; otherwise, it ignores the message.
To prevent redundant messages being sent, each gateway node keeps track of the last message
received from each sensor within its cluster. Thus, if an identical message is received from
another sensor, it will not send it again.
When the residual energy of the gateway is below the threshold Es, it initiates re-election of the
gateway, but this time it does not postulate. If during this re-election, there is no sensor that has
residual energy greater than the threshold Es, two solutions are possible with the last active
cluster-head:
It can decrease the threshold value (for example by half, i.e., Es/2), and inform the
sensors of its cluster. This allows the network to stay functional longer;
It can also send a warning message to the sink node in order that, either new fixed sensors
are deployed in the cluster or a mobile sensor is sent there. In the case of a rechargeable
network, this alert message can initiate the charging mechanism of the sensors.
Remark: In our work, we assume that all the sensors in cluster (1,j,k) can directly communicate
with the sink node. In the opposite case, sensors in cluster (1,j,k) that are candidates to become
the gateway node must also verify that they can communicate with the sink node before sending
the Head message. In this case, the sink node must participate in the election process as the only
sensor in cluster (-1,-1,-1).
Once the data are forwarded to the cluster-head, it must route them wisely to sink node, possibly
through other clusters. The next task (second phase of the second step) in our protocol describes
how the messages collected in the different clusters are routed to the sink node.
75
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
77
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
The protocol presented in this section is not suitable for sparse networks, in which the sensors
partially occupy the deployment area. In this case, routing of data to the sink node can no longer
follow the clear and optimal path (angular wedge) used for dense networks.
Figure 7: Impact of the use of cluster-heads on the conservation of the energy of ordinary sensors
In contrast to dense networks, in which the data collected by cluster (i, j, k) are routed to the sink
node through cluster (i-1,j,k), in a low-density network, there is no guarantee that cluster (i-1,j,k)
will contain sensors that can forward the messages. Thus, an empty clusters detection phase must
precede routing of data in order to define the best path for the data to follow. This empty clusters
detection phase also makes it possible to determine the area actually covered by the sensors after
the deployment, and therefore gives the possibility of reacting accordingly.
A cluster is considered empty if it contains no sensor, or if it contains a set of sensors
disconnected from the rest of the network.
4.1. DETECTION OF EMPTY CLUSTERS AND DISTRIBUTED CLUSTER-HEAD ELECTION
Knowledge of the distribution of the sensors in the space of interest enables the sink node to
determine the optimal path from a cluster to the sink (or to another cluster).
For l coronas, m horizontal wedges, and n vertical wedges, there are (l m n) clusters in the
virtual architecture; therefore, for each message received, the sink regularly updates two tables
h(l, m, n) and relay(l, m, n). Each entry (i, j, k) of table h(l, m, n) contains one if cluster (i, j, k) is
not empty and zero otherwise, allowing the sink to obtain a global view of the sensors
distribution; and each entry (i, j, k) of the table relay(l, m, n) contains the coordinates of the relay
cluster of the cluster (i, j, k).
78
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
Because cluster-heads significantly affect conservation of the energy of the ordinary sensors, as
well as the routing of data, they must be elected as soon as possible. We propose to realize
distributed cluster-heads election during the empty clusters detection phase.
4.1.1. THE SINKS ALGORITHM
At the beginning, the sink periodically broadcasts the date on which the detection algorithm will
begin. All sensors are awake when the sink initiates the detection. It then transmits its
neighboring clusters (those of the first corona) a Detect message containing its coordinates (-1, -
1). Then, it waits for acknowledgments (ACK messages) that will allow it to update tables h(l, m,
n) and relay(l, m, n). Owing to network connectivity, it is certain that at least one sensor will
receive this message. During the process, each message transmitted by a sensor towards the sink
contains the coordinates of its cluster and those of its relay cluster. Table h(l, m, n) is also
initialized to zero. At each reception of a message from a sensor in a cluster (i, j, k), the sink node
puts one in h(i, j, k) and, in the entry relay(i, j, k), it assigns the coordinates of its relay cluster
obtained from the variable relay of the received message. At the end of the algorithm, cluster (i, j,
k) is considered empty when h(i, j, k) = 0, and the relay cluster of cluster (i, j, k) is determined by
the value of the entry relay(i, j, k).
4.1.2. THE SENSORS ALGORITHM
The network must be connected; therefore, for all clusters (i, j, k) considered non-empty, there is
always a path from it to the sink node. Isolated clusters cannot reach the sink and are considered
empty even if there are not. For the sensors, there are three main events in the detection of empty
clusters: reception of a Detect message asking sensors to indicate their coordinates (here, this is
equivalent to the reception of a Hi message in Section 4.1); reception of a Head message sent by
a sensor of the same cluster to postulate as cluster-head (it starts the cluster-head election
process); and reception of an ACK message sent by a cluster-head to the sink node to indicate its
coordinates and those of its relay cluster.
Reception of a Detect message
In order to reach the sink by the shortest path, the sensors of each cluster must choose their relay
cluster wisely. To accomplish this, each sensor has to route only the first Detect message that it
receives. When a sensor receives a Detect message, it checks if it has not already had to route a
Detect message. If it has not, it forwards it to enable the sensors in the other clusters to signal
their coordinates. Otherwise, it ignores the message. Subsequently, each sensor that received its
first Detect message, constructs a Head message and forwards it in its cluster to postulate as
cluster-head.
Reception of a Head message
This election is carried out as in Section 4.1. At the end of the cluster-head election, the elected
cluster-head sends an ACK message to the sink through their relay cluster. The cluster-heads of
the first corona send their ACK message directly to the sink, while those of the other coronas send
theirs on through the relay cluster.
Reception of an ACK message
A sensor that receives an ACK message from its neighbor node checks whether the message is for
its cluster and, if it is, it sends it to its gateway node (cluster-head), which checks if it has already
routed an ACK message from the same cluster. If it has not, it sends the message through its relay
cluster. Otherwise, it simply ignores the message.
79
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
4.2. ROUTING
The sink node uses tables h(l, m, n) and relay(l, m, n) to build a message propagation tree that
presents the path traveled by the messages from each cluster. This tree can be optimized (for
example, by decreasing its height) to decrease the distance between the sink and the different
clusters.
To send the messages to the sink node, the sensors in cluster (i, j, k) send them to their relay
cluster (through their cluster-head), which in turn transmits them to their relay cluster, and so on,
to the sink node. Figure 8 illustrates this communication process. Clusters (i-1, j, k), (2, j-1, k),
and (1, j-1, k) are empty. It can be seen that cluster (i, j-1, k) is the relay of cluster (i, j, k), and the
messages coming from cluster (i, j, k) pass through clusters (i,j-1,k), (i-1, j-1, k), (i-2, j-1, k), ,
(2, j-1, k), and (1, j-1, k) to reach the sink node. These messages pass alternately through two
angular wedges.
80
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
5. CONCLUDING REMARKS
This paper proposed a virtual architecture for 3D WSNs and a dynamic coordinate system for
collections of anonymous sensor nodes deployed in the space. The coordinate system provides, at
no extra cost, an interesting clustering scheme in which two nodes are in the same cluster only if
they have the same coordinates. It is important to note that this clustering scheme operates for
anonymous sensor nodes. Thus, sensor nodes do not know the identity of the other nodes in the
same cluster. A lightweight and secure protocol for use by the sensors, during training, to learn
their coordinates was also proposed. As it is energy efficient, this training can be repeated on
either a scheduled or an ad hoc basis to provide robustness and dynamic reorganization. We also
showed that in a trained WSN the tasks of routing and data fusion can be performed by very
simple and energy-efficient protocols.
Two simple and energy-efficient routing protocols for dense and sparse networks, based on the
dynamic coordinate system, and which minimize the power expended in collecting and routing
data to the sink node were also presented. Further, the concepts of cluster-head and relays cluster,
81
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
which facilitate centralized data compression or data aggregation in a cluster before transfers
were also introduced for more efficiency. They are also used to avoid network congestion, and to
preserve the overall energy of the sensors; thereby increasing the lifetime of the network.
However, despite these encouraging results, there is more work to be done. Firstly, in our model,
synchronization of sensors with the global clock of the sink node after a period of sleep, has not
yet been actualized. Further, the channel access method needs to be improved. Secondly, new
challenges have appeared in sparse sensor networks. These challenges include management of
network connectivity, routing optimization by seeking an optimal means of reaching the sink
node, and management of mobile sensors in areas not covered by fixed sensors. Finally, because
sensors are often deployed in unattended areas, they can be subject to external attack. Thus,
security is also a major issue for routing in this architecture.
APPENDIX
Cluster-heads election pseudo-code
The pseudo-codes presented in this section enable sensors to choose a gateway node in each
cluster. The notations presented in Table 1 are used.
The init() procedure (Algorithm 1) facilitates initialization of the cluster-head election process in
each cluster by broadcasting the message Hello. It helps the sensors that have sufficient energy to
test the connectivity to their relay cluster. The reception_Hello() procedure (Algorithm 2)
describes the behavior of the sensors while receiving the Hello message, it enables them to send
an acknowledgment (Hi message) to the sensors in the
82
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
83
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
The election_gateway() procedure (Algorithm 5) makes calls to all the other procedures to
complete the gateway node election process. It comprises two phases: In the first phase, sensors
with residual energy greater than Es verify whether they can communicate with the relay cluster
(procedures 1, 2, and 3). In the second phase, the choice for gateway node is made.
The variables already_receive_Hello and already_receive_Hi ensure that a sensor reacts only
once after reception of Hello and Hi messages.
84
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
Each sensor makes only one call to the init() procedure and reacts only once on receiving Hello
and Hi messages. As each sensor can be a candidate in the gateway node election, a sensor can
respond several times when a Head message is received. As we assumed the network is dense, we
cannot predict the number of sensors in each cluster. Consequently, we cannot predict the number
of times Procedure 4 will be called. Therefore, it is up to the network administrator to
parameterize the duration of each phase of Algorithm 5. Nevertheless, the duration of each phase
should enable the execution of Procedures 2 and 3 once, and the execution of Procedure 4 several
times.
Corollary: The times T1 and T2 of each phase of Algorithm 5 should be determined according to
the number of slots necessary for execution of Procedures 2, 3, and 4 and to the maximal number
of sensors in a cluster.
REFERENCES
[1] Akyildiz, I. F., Su, W., Y. Sankarasubramaniam, Y. and E. Cayirci, E. (2002) Wireless sensor
networks: A survey, Comput. Networks, 38(4), 393-422.
[2] Zhirnov, V. V. and Herr, D. J. (2001). New frontiers: Self-assembly and nanoelectronics.,
Computer, 34(1), pp. 34-43.
[3] Agre, J. and Clare L. (2000). An integrated architecture for cooperative sensing networks,
Computer, 33(5), pp. 106-108.
[4] Dargie, W. W. and Poellabaurer, C. (2010) Fundamentals of Wireless Sensor Networks: Theory and
Practice,, Wiley.
[5] Intanagonwiwat, C., R. Govindan,R. and D. Estrin, D. (2000) Directed diffusion: A scalable and
robust communication paradigm for sensor networks. MOBICOM, pp. 56-67.
[6] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler D. E. (2001) Spins: Security protocols
for sensor networks, In: Proceedings of the 7th Annual ACM/IEEE International Conference on
Mobile Computing and Networking, pp. 189-199.
[7] Shen, C. C., Srisathapornphat, C. and Jaikaeo, C. (2001) Sensor information networking architecture
and applications, IEEE Pers. Commun., 8(4), 52-59.
[8] Tilak, S., Abu-Ghazaleh, N. B. and Heinzelman, W.(2002) A taxonomy of wireless micro-sensor
network models. ACM SIGMOBILE Mobile Computer Communication Review., 6(2), 28-36.
[9] El Emary,I. M. M. and S. Ramakrishnan, S. (2013) Wireless Sensor Networks: From Theory to
Applications, CRC Press.
[10] Li, Y. and Thai, M. T. (2013). Wireless Sensor Networks and Applications, Springer.
[11] Bar-Yehuda, R., Goldreich, O. and Itai, A. (1991) Efficient emulation of single-hop radio network
with collision detection on multi-hop radio network with no collision detection. Distributed
Computing, 5(2), pp. 67-71.
[12] Bertzekas,D. and Gallager R. (1992) Data Networks, Second Edition, Prentice-Hall.
[13] Li, C., Wang, Z. and Yang, C. (2011) Secure Routing for Wireless Mesh Networks, International
Journal of Network Security, 13(2), 109-120.
85
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
[14] Saroit, I. A., El-Zoghdy, S. F. and Matar, M. (2011) A scalable and distributed security protocol for
multicast communications, International Journal of Network Security, 12(2), 61-74.
[15] Karlof, C., Sastry, N. and Wagner, D. (2000) TinySec: A link layer security architecture for wireless
sensor networks, Proceedings of the 2nd International Conference on Embedded Networked Sensor
Systems, pp. 162-175, ACM.
[16] Boufares, N., Khoufi, I., Minet, P., Saidane, L. and Ben Saied, Y. (2015) Three dimensional mobile
wireless sensor networks redeployment based on virtual forces, IEEE Wireless Communications and
Mobile Computing Conference (IWCMC), pp.563-568.
[17] A. Wadaa, A., S. Olariu, S., L. Wilson, L., M. Eltoweissy, M. and K. Jones K..(2005) Training a
wireless sensor network, Mobile networks and Applications, 10(1-2), 151-168, 2005.
[18] Bertossi, A. A., Olariu S., Pinotti M. C. (2008) Efficient corona training protocols for sensor
networks, Theoretical Computer Science, 402(1): 2-15.
[19] Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. (2004) Wireless sensor networks: leveraging
the virtual infrastructure. IEEE Network 18(4): 51-56.
[20] Howard, A., Mataric, M.J. and Sukhatme, G. S. (2002) An Incremental Self-Deployment Algorithm
for Mobile Sensor Networks, Autonomous Robots, Special Issue on Intelligent Embedded Systems,
13(2), pp. 113-126.
[21] Tamoghna, O., Manas, M. and Studip M..(2013) Tic-Tac-Toe-Arch: a self-organising virtual
architecture for Underwater Sensor Networks. IET Wireless Sensor Systems, vo. 3, Issue: 4, pp. 307-
316.
[22] Capella, J. V., Bonastre, A., Serrano, J. J. and Ors, R. (2009) A New Robust, Energy-efficient and
Scalable Wireless Sensor Networks Architecture Applied to a Wireless Fire Detection System,
International Conference on Wireless Networks and Information Systems, WNIS '09. pp. 395 398.
[23] Miao, C., Dai, G., Zhao, X., Tang, Z. and Chen, Q (2014) 3D Self-Deployment Algorithm in Mobile
Wireless Sensor Networks, In: Sun L., Ma H., Fang D., Niu J., Wang W. (eds) Advances in Wireless
Sensor Networks-CWSN 2014. pp. 27-41.
[24] Chen, J., Qian, H. (2014) Three-dimensional deployment algorithm based on ideal fluid dynamics
model for mobile sensor networks, Computer Modelling & New Technologies 18(9)12-18
[25] Huang, C-F., Tseng, Y-C. and Lo L-C. (2007) The coverage problem in three-dimensional wireless
sensor networks, Journal of Interconnection Networks, 8, Issue 03, p. 209.
[26] Langendoen, K.. and Reijers, N. (2003). Distributed localization in wireless sensor networks: A
quantitative comparison, Computer Network, 43(4), 499-518.
[27] Tanenbaum A. and Wetherall D. (2011) Computer Networks, Pearson Education, Inc/ Prentice Hall.
[29] A. Allirani, A. and M. Suganthi M.(2008) An energy sorting protocol (ESP) with low energy and low
latency in wireless sensor networks. International Journal of Computer Science and Network
Security, 8(11), pp. 208-214.
86
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 9, No. 5, October 2017
AUTHORS
Vianney Kengne Tchendji is a Senior Lecturer of Computer Science at the University
of Dschang, Dschang, Cameroon. He received his PhD in Computer Science from the
University of Picardie-Jules Verne, Amiens, France, in 2014. His current research
interests include network virtualization, parallel algorithms and architectures,
scheduling, wireless communication, ad hoc and sensor networking.
87